Effective
Professional
Affordable



InfoSec in the News

Many of these news stories could have been prevented with an effective security awareness program or they promote the use of security awareness.
Also visit our News Archives for older stories

Subscribe to the following e-mail lists for even more stories:

SANS NewsBites

Digital Forensic Investigator News

SC Magazine Newswire

Security Wire Digest

Sophos Virus News

 

- Visit SANS, Sophos, SC magazine, and InfoSecurity magazine websites to sign up for news feeds -

18 June 2014 - San Diego hospital breach investigation reveals second incident, both human error
Nearly 20,000 patients of Rady Children's Hospital (RCH) in San Diego are being notified that their personal information was erroneously included in emails sent to job applicants
http://www.scmagazine.com/san-diego-hospital-breach-investigation-reveals-second-incident-both-human-error/article/356497/?DCMP=EMC-SCUS_Newswire

17 June 2014 - Email sent to wrong address, data on more than 35K Calif. students at risk
More than 35,000 Riverside Community College District (RCCD) students in California are being notified that their personal information – including Social Security numbers – was included in an email that was sent to the wrong external email address.
http://www.scmagazine.com/email-sent-to-wrong-address-data-on-more-than-35k-calif-students-at-risk/article/356227/?DCMP=EMC-SCUS_Newswire

13 June 2014 - Prison Sentence for Former Microsoft Employee Who Leaked Information to Blogger
A former Microsoft employee has been sentenced to three months in prison for leaking sensitive information. Alex Kibkalo worked for Microsoft in Russia and Lebanon. He provided a French blogger with several updates prior to their release dates; he leaked the information because he was unhappy with having received an unsatisfactory performance review. Kibkalo has been in custody since his March 19 arrest, so the majority of his sentence has already been served. When Kibkalo is released, he will be deported to Russia.
http://www.csmonitor.com/Innovation/Horizons/2014/0613/Former-Microsoft-employee-sentenced-to-prison-after-leaking-company-secrets

12 June 2014 - Stolen thumb drive contained five years of data on nearly 34K Calif. patients
Nearly 34,000 patients who received X-ray services at California-based Redwood Regional Medical Group are being notified that their personal information was on a thumb drive that was stolen from an employee's locker.
http://www.scmagazine.com/stolen-thumb-drive-contained-five-years-of-data-on-nearly-34k-calif-patients/article/355523/?DCMP=EMC-SCUS_Newswire

10 June 2014 - Man Admits to Stealing eMail Credentials and Fraudulent Activity
Attackers were able to exploit weaknesses in systems at US government agencies to trick employees at the Environmental Protection Agency (EPA) and Census Bureau into revealing their email account access credentials. The attackers used the accounts to order nearly US $1 million worth of office supplies, which they sold online. One man has admitted to offenses related to the scheme; he faces up to 20 years in prison. Some government agencies have not implemented encryption and verification procedures on webpages and email, enabling this sort of attack.
http://www.nextgov.com/cybersecurity/2014/06/fake-dot-gov-webmail-used-phishing-scam-hack-epa-and-census-staff/86374/?oref=ng-channeltopstory

10 June 2014 - Bank of Montreal ATM Hacked with Weak Password
A story in the Winnipeg Sun describes how two local teenagers put a Bank of Montreal ATM into operator mode using an easily-guessed password.
http://www.dfinews.com/blogs/2014/06/bank-montreal-atm-hacked-weak-password?et_cid=3987357&et_rid=454833223&location=top

10 June 2014 - Penn State Hershey employee takes data home, puts 1,801 patients at risk
About 1,800 patients of Penn State Hershey Medical Center are being notified that their information had the potential to be compromised because a clinical laboratory technician had been working with the data from home, outside the secured Penn State Hershey system.
http://www.scmagazine.com/penn-state-hershey-employee-takes-data-home-puts-1801-patients-at-risk/article/354934/?DCMP=EMC-SCUS_Newswire

9 June 2014 - Cyber Crime Costs Global Economy $445B
Cyber crime has a significant impact on economies worldwide. A new report from the Center for Strategic and International Studies (CSIS) concludes that cyber crime costs businesses approximately $445 billion worldwide, with an impact on approximately 150,000 jobs in the EU and 200,000 jobs in the U.S.
http://www.dfinews.com/news/2014/06/cyber-crime-costs-global-economy-445b?et_cid=3985403&et_rid=454833223&location=top

9 June 2014 - Facebook Stupidity Leads to Largest Gang Bust in NYC History
a long trail of quite helpful Facebook postings about crimes that lead New York City police to what authorities are calling "the largest gang takedown in New York City's history."
http://www.dfinews.com/blogs/2014/06/facebook-stupidity-leads-largest-gang-bust-nyc-history?et_cid=3985403&et_rid=454833223&location=top

9 June 2014 - Town Refuses to Pay Crypto Ransom for Police Computers
The town manager of a hamlet in south eastern New Hampshire has defied demands that he pay a ransom to recover police department computer files taken hostage by Cryptowall, a newer piece of malware that encrypts hard drive contents of infected machines until victims pay for them to be decrypted.
http://www.dfinews.com/news/2014/06/town-refuses-pay-crypto-ransom-police-computers?et_cid=3985403&et_rid=454833223&location=top

30 May 2014 - CryptoDefense ransomware targets vulnerable Java users
CryptoDefense, a variant of CryptoLocker, was used by saboteurs to rake in more than $34,000 between February and March, Symantec researchers found. Now, analysts at Bromium Labs warn the malware, which holds victim files hostage by employing public-key cryptography using strong RSA encryption, is being delivered to users via a Java exploit.
http://www.scmagazine.com/cryptodefense-ransomware-targets-vulnerable-java-users/article/349263/?DCMP=EMC-SCUS_Newswire

30 May 2014 - Home Depot staffer fired, tapped 30,000 accounts, shared card data
Home Depot, which last experienced an insider breach in February, has fired and is prosecuting an employee who, for two weeks in May, accessed information on more than 30,000 customer accounts.http://www.scmagazine.com/home-depot-staffer-fired-tapped-30000-accounts-shared-card-data/article/349253/?DCMP=EMC-SCUS_Newswire

30 May 2014 - Study: 432M hacked accounts in a year, large part of U.S. at risk
The bleak figure was said to be a conservative estimate by the Ponemon Institute, which calculated the findings at the request of CNNMoney. According to the outlet, the number of hacked accounts among impacted Americans topped 432 million accounts during that time period.
http://www.scmagazine.com/study-432m-hacked-accounts-in-a-year-large-part-of-us-at-risk/article/349254/?DCMP=EMC-SCUS_Newswire

30 May 2014 - French Spy on US Companies, Too
State-sponsored French hackers are probably the most “capable” of stealing the business secrets of American companies, after China, according to former CIA director and defense secretary, Robert Gates.
http://www.dfinews.com/news/2014/05/french-spy-us-companies-too?et_cid=3968266&et_rid=454833223&type=cta

29 May 2014 - US Cyber Crime Rising Faster than Resistance
The 12th annual survey of cybercrime trends found that online attackers determined to break into computers, steal information and interfere with business are more technologically advanced than those trying to stop them.
http://www.dfinews.com/news/2014/05/us-cyber-crime-rising-faster-resistance?et_cid=3966507&et_rid=454833223&type=headline

28 May 2014 - iPhones and iPads Held Hostage
Some owners of iPhones and iPads have found their devices held hostage by malware that locks them until the demand, usually about US $100, is paid. The attacker exploited the Find My iPhone feature to launch the attack, which has mainly affected people in Australia. While it is not clear how the attacker obtained the information used to launch the attacks, there is speculation that it was obtained in a breach and it would affect users who use the same set of credentials for multiple accounts. Apple denied that its iCloud service has been breached. Apple Australia recommends that users change their Apple ID passwords.
http://www.telegraph.co.uk/technology/apple/10857715/iPhones-frozen-by-hackers-demanding-ransom.html

21 May 2014 - eBay Criticized for Handling of Breach
eBay has met with widespread criticism for the way it handled a breach that exposed user data. On May 21, eBay acknowledged that a database containing user passwords and personally identifiable information was compromised. The intrusion occurred in February or March of this year.
eBay became aware of the breach earlier this month. The company was taken to task for delaying notification for so long and for the labyrinthine process users had to navigate to change their passwords.
Furthermore, the volume of users trying to change their passwords was at one point overwhelming eBay's system. People want to know why they did not detect the intrusion for three months, but eBay and the FBI have not been forthcoming with details about the breach.
http://www.nbcnews.com/tech/security/silent-auction-ebay-fbi-mum-hack-details-n112186
http://www.v3.co.uk/v3-uk/news/2346280/ebay-slammed-for-password-plundering-after-giant-breach
http://arstechnica.com/security/2014/05/ebay-buryies-its-own-advisory-to-change-passwords-following-database-hack/

14 May 2014 - Google Drawing Harder Line on Suspicious Google Apps Logins
Google is imposing stronger requirements on Google Apps logins that appear suspicious. If the company suspects that a login attempt is being made by someone other than an account's legitimate user, Google will ask the person logging in to enter a verification code sent via SMS to authenticate their identity, even if users have not activated that security feature. Google will eventually roll out the stricter login requirements to all its domains.
http://www.cnet.com/news/google-gets-tougher-on-suspicious-google-apps-logins/

9 May 2014 - Canadian Teens Face Charges in SWATting Attacks
A teenager in Canada has been arrested in connection with making bomb threats and placing calls to emergency services reporting phony life-threatening situations, which is known as "SWATting." The teen allegedly placed at least 30 such calls, which caused law enforcement agencies to deploy SWAT teams to locations of the teen's choosing. Two other teenagers are facing similar charges.
http://www.ottawacitizen.com/news/Swatting+leads+charges+against+Ottawa/9824837/story.html
http://www.ctvnews.ca/canada/ottawa-teen-facing-60-charges-related-to-swatting-1.1815334

8 May 2014 - New York Hospitals Pay US $4.8 Million Fine for HIPAA Violation
New York Presbyterian Hospital and Columbia University Medical center have paid US $4.8 million in a settlement with the US Department of Health and Human Services for violations of the Health Insurance Portability and Accountability Act (HIPAA). Patient data were unintentionally exposed when a doctor tried to deactivate a computer he personally owned from a network segment that held roughly 6,800 patients' lab results, medication data, and other sensitive information.
http://www.computerworld.com/s/article/9248205/IT_malpractice_Doc_operates_on_server_costs_
hospitals_4.8M?taxonomyId=17

7 May 2014 - Ransomware Hitting Androids
Ransomware is now targeting devices running the Android mobile operating system. The malware delivers a screen with a message that appears to come from a law enforcement agency, informing users that they have been caught viewing illegal content and that their devices will be blocked until they pay US $300. The current version of the malware does not actually lock up the devices, but the ransom screen pops up continually.
Devices become infected when users visit certain pornography websites where they are asked to install an APK that claims to be a video player.
To become infected, users must allow out-of-market apps and manually install the APK. Versions of the malware have also been detected in Germany, Italy, Poland, the UK, and the United Arab Emirates with messages customized for each country.
http://www.scmagazine.com/ransomware-on-android-scares-users-with-govt-notices-asks-for-300/article/346005/
http://arstechnica.com/security/2014/05/your-android-phone-viewed-illegal-porn-to-unlock-it-pay-a-300-fine/

2 May 2014 - Attack Targets Facebook Users in India
An attack targeting Facebook users in India tries to lure people in with the offer of a tool that will supposedly allow them to break into other people's accounts. The attack directs users to a Google Drive document that contains JavaScript code. Users are instructed to cut and paste the code into their browser's console window. Instead of being able to break into other people's accounts, the users' own Facebook accounts are hijacked. The attack is called self cross-site scripting because the users are induced to run the attack code themselves. While the attack has clear signs that it is a scam, it has reportedly still racked up
50,000 to 100,000 likes for various pages.
http://www.theregister.co.uk/2014/05/02/india_facebook_self_cross_site_scripting_scam/
http://www.pcworld.com/article/2150360/bogus-facebook-hacking-tool-dupes-users.html

30 April 2014 - Study Shows More than 40 Percent of Identity Theft is Medical-Related
A survey recently released by the Identity Theft Resource Center found that 43 percent of all identity thefts reported in the US in 2013 were medical-related. Stolen medical identity information has been used to obtain treatment and prescription medicines; medical identity fraud also places incorrect information in the patients health records.

http://www.studentdoctor.net/2014/04/the-rise-of-medical-identity-theft-in-healthcare/

29 April 2014 - Phishing Scheme Used VoIP to Steal Debit Card Data
In a new variation on phishing campaigns, thieves used text messages and VoIP (voice over Internet protocol) calls to steal debit card data from customers of a number of US financial institutions. The targeted bank customers received text messages telling them their debit card has been deactivated and were given a phone number to call to reactivate the card. The number sent them to an interactive voice response (IVR) system that asked for their debit card number and PIN.
http://www.computerworld.com/s/article/9248027/Voice_phishing_scheme_lets_hackers_steal_
personal_data_from_banks?taxonomyId=17

http://www.scmagazine.com/phishing-campaign-uses-voip-to-target-dozens-of-banks-steal-card-data/article/344674/

28 April 2014 - AOL Says User Data Were Stolen
AOL now says that the attackers who sent spoofed email that appeared to come from AOL addresses compromised account information of at least two percent of AOL users. Compromised data include email addresses, contact lists, encrypted passwords, and encrypted answers to security questions.
AOL is urging all users to change their passwords and security questions.
http://www.theregister.co.uk/2014/04/28/aol_confirms_security_breach_from_spam_attack/http://www.nbcnews.com/tech/security/youve-got-hacked-aol-confirms-significant-number-mail-users-hit-n91701

25 April 2014 - Stanford's New Password Policy
Stanford University has implemented a new password policy. Users will be permitted to have extremely long (20 characters or more) passwords and not be subject to character complexity requirements: using upper- and lower-case letters, numbers, and symbols. Short (eight character) passwords must fulfill the all complexity requirements. The requirements drop at 12, 16, and 20 characters. All passwords will be vetted to ensure that they are not common or too weak.
http://arstechnica.com/security/2014/04/stanfords-password-policy-shuns-one-size-fits-all-security/
http://itservices.stanford.edu/service/accounts/passwords

25 April 2014 - Nine Sentenced for Roles in Barclays Thefts
Tony Colston-Hayter has been sentenced to five and a half years in prison for orchestrating a GBP 1.25 million (US $2.1 million) theft from two branches of Barclays bank in April and July of 2013. Pretending to be tech support contract employees, Colston-Hayter and his accomplices placed keyboard video mouse (KVM) switches and wireless routers on computers in the targeted banks to gain access to the bank's internal system and steal the information they used to empty six bank accounts.
Less than half of the funds have been recovered. Eight accomplices have also been sentenced; their punishments range from suspended sentences to eight years in prison. Three more people are slated to be sentenced in June.
http://arstechnica.com/tech-policy/2014/04/bank-robbers-use-kvm-switch-and-3g-router-to-steal-money/
http://www.theregister.co.uk/2014/04/25/kvm_crooks_jailed/

21 April 2014 - Malware Steals Apple ID Credentials from Jailbroken iOS Devices
Malware detected in the wild steals Apple ID credentials from jailbroken iPhones and iPads. The malware is being called "unflod," which is the name of a library that it installs on infected devices. Unflod was detected after users reported repeated crashes of jailbroken iOS devices. Users noticed that the problems began occurring after they installed jailbroken-specific customizations, also known as tweaks, that came from someplace other than Cydia, an alternative Apple App Store store for jailbroken iOS devices.
http://arstechnica.com/security/2014/04/active-malware-campaign-steals-apple-passwords-from-jailbroken-iphones/
http://www.infosecurity-magazine.com/view/38049/baby-panda-goes-after-jailbroken-apple-iphones/

4 Mar 2014 - Thousands of Wireless Routers Hijacked
More than 300,000 wireless routers used in homes and in small office settings have been compromised. The attack reconfigured the DNS settings on D-Link, Micronet, Tenda, TP-Link, and other devices. So far, the compromised routers have not been used for any malicious purpose, but they could be used to redirect users to sites that try to steal financial account access information. Most of the compromised routers are in Eastern Europe, Vietnam, and Europe.
http://www.theregister.co.uk/2014/03/04/team_cymru_ids_300000_compromised_soho_gateways/
http://arstechnica.com/security/2014/03/hackers-hijack-300000-plus-wireless-routers-make-malicious-changes/

4 Mar 2014 - Illinois Bank Urges People to Stop Using Credit Cards in Cabs in Chicago
First American Bank in Illinois is urging cab riders in Chicago to avoid paying with credit or debit cards, warning of an ongoing data breach that seems to be connected with card processing systems used by a large number of taxis in Chicago. First American became aware of the situation in early February when several customers complained about fraudulent charges on their accounts. The commonality among the cards was having been used in Chicago taxis. The bank has begun cancelling the cards of customers who charge taxi fare and issuing them new ones. The bank has reported the issue to MasterCard.
http://krebsonsecurity.com/2014/03/illinois-bank-use-cash-for-chicago-taxis/
http://www.scmagazine.com/bank-reports-payment-cards-used-in-chicago-cabs-being-compromised/article/336550/

21 Feb 2014 - Malicious Apps in Google Play Store
Between 2011 and 2013, the percentage of malicious apps in the Google Play store increased by nearly fourfold, from 2.7 percent in 2011 to 12 percent in 2013. Over that same period of time, the number of malicious apps that Google removed dropped from 60 percent to 23 percent. The decline in removal of malicious apps could be explained by the fact that malware purveyors are using methods of infection that elude traditional detection tools.
http://www.scmagazine.com//report-malicious-apps-in-google-play-store-grow-388-percent/article/334961/

10 Feb 2014 - North Carolina Law Firm Loses "All Documents" to Cryptolocker
A law firm in North Carolina has reported losing all of its legal documents to the Cryptolocker ransomware, even though the company tried to pay the US $300 ransom. Because the firm's IT staff attempted to decrypt the files, by the time the decision was made to pay the ransom, the three-day ransom deadline period had expired.
http://www.computerworlduk.com/news/security/3501150/cryptolocker-scambles-us-law-firms-entire-cache-of-legal-files/

7 Feb 2014 - Phony Army Benefits Website May Have Stolen Credentials
A website set up to mimic a US Army benefits site may have managed to trick soldiers into providing their personal information. The site, which called itself My Army Benefits, bears a name nearly identical to a real site, myarmybenefits.us.army.mil. The fraudulent site, which included a misspelled word in its name, collected soldiers' Army Knowledge Online (AKO) access credentials.
http://www.nextgov.com/defense/2014/02/warning-sham-my-army-benefits-site-could-steal-your-credentials/78488/?oref=ng-HPtopstory

7 Feb 2014 - PCI Standard Compliance Treated as Annual Hurdle, Not Consistent Practice
According to a report from Verizon, most companies that attain annual compliance with the Payment Card Industry Data Security Standard (PCI DSS) do not maintain that compliance over the course of the following year. Verizon based its report on PCI compliance assessments it conducted on more than 500 organizations between 2011 and 2013. According to the data, just over 11 percent of organizations maintained compliance between annual assessments. The problem is that many organizations treat compliance as an annual test rather than a "continuous risk management effort."
http://www.computerworld.com/s/article/9246128/Maintaining_PCI_compliance_is_a_big_challenge_
for_most_companies?taxonomyId=17

6 Feb 2014 - Wireless Devices Attacked at Sochi
Proving correct predictions that wireless devices will be targeted by cyber criminals at the Sochi Olympics, NBC foreign correspondent Richard Engel found that two laptops and his smartphone were quickly compromised with malware that enabled attackers to use the devices to eavesdrop and access data on the devices. The laptops were probed within minutes of connecting to the Internet, and soon after, Engel received a phishing message. A researcher who accompanied Engel has acknowledged that the laptops were fresh out of the box with no updates and no security software, and that the phone was compromised after the user agreed to install an .apk from a Sochi website. Even so, visitors to Sochi are likely to face a barrage of attempted cyber attacks.
http://www.nbcnews.com/storyline/sochi-olympics/richard-engel-sochi-open-hunting-season-hackers-n22346

http://www.scmagazine.com//sochi-hackers-compromise-reporters-laptops-smartphone/article/333073/

31 Jan 2014 - California High School Students Expelled for Using Keystroke Logger
Eleven Corona del Mar High School students have been expelled for placing keystroke loggers on teachers' computers and using the credentials obtained from the loggers to change grades and access exams.
No charges have been filed at this point, although police have obtained search warrants, which suggests they may pursue felony counts against the students. A private tutor has also been implicated in the case.
http://touch.latimes.com/#section/-1/article/p2p-79094718/
http://www.scmagazine.com//calif-high-schoolers-expelled-after-using-keylogger-doctoring-grades/article/332113/

30 Jan 2014 - Eleven People Arrested in eMail Hacking-for-Hire Schemes
Eleven people have been arrested in four countries in connection with several websites that offered to gain access to email account passwords. In the US, five people have been arrested. Two have been charged with operating websites that advertised the services, and the three others have been charged for using similar services offered on websites hosted outside the US. Four people were arrested in Romania, and one person each in India and China.
http://www.bbc.co.uk/news/technology-25911727
http://arstechnica.com/security/2014/01/investigation-of-password-crackers-turns-up-site-feds-say-hacked-6000-accounts/

30 Jan 2014 - Yahoo Resetting Passwords After Compromise Attempts
Yahoo has reset passwords for Yahoo Mail accounts that appear to have been compromised. Yahoo said that the attackers had likely stolen usernames and passwords from a third-party database and attempted to use the information to log into Yahoo Mail accounts. Users whose accounts were affected received messages from Yahoo notifying them of "unusual activity on the network."
Internet Storm Center:
https://isc.sans.edu/forums/diary/Attack+on+Yahoo+mail+accounts/17543
http://money.cnn.com/2014/01/30/technology/security/yahoo-hack/

27 Jan 2014 - Laptops Stolen From Coca-Cola Contained Unencrypted Employee Data
The theft of unencrypted laptops from the Coca-Cola Company has compromised personal information of about 74,000 current and former employees. The data on the computers include names, Social Security numbers (SSNs) and driver's license numbers. A former employee who had been responsible for maintaining and decommissioning equipment took the computers; they have since been recovered.
http://www.scmagazine.com/theft-of-unencrypted-laptops-behind-coca-cola-breach-impacting-74000/article/331273/

24 Jan 2014 - Stolen Laptop Contains Health Data of 620,000 Alberta, Canada Residents
A laptop stolen from an IT consultant contains unencrypted health data of 620,000 residents of Alberta, Canada. The data include names, birth dates, provincial health card numbers, and diagnostic codes. The Medicentres Family Health Care Clinics notified Edmonton police and the Alberta Information Privacy Commissioner about the incident on October 1, 2013, but Alberta's health minister was informed just last week.
http://cnews.canoe.ca/CNEWS/Canada/2014/01/22/21418891.html

24 Jan 2014 - CNN Blogs and Social Media Accounts Hijacked
Members of the Syrian Electronic Army (SEA) used phished passwords to social media accounts from CNN employees. The phishing messages were well written and appeared to come from other CNN employees. The compromised accounts were used to post propaganda; the unauthorized posts were removed minutes after they appeared.
http://www.darkreading.com/attacks-breaches/report-phishing-attacks-enabled-sea-to-c/240165675
http://www.scmagazine.com/cnns-social-media-accounts-compromised-by-syrian-electronic-army/article/331017/s

23 Jan 2014 - Study Says France's Three-Strike Policy Has Not Curbed Piracy
A study of French Internet users found that the country's "three-strikes" anti-piracy policy has had little to no effect on users obtaining pirated content. The policy "has not deterred individuals from engaging in digital piracy [nor has it lessened] illegal activity of those who did engage in piracy," according to the report's authors, researchers at the University of Delaware and the University of Rennes. The report does mention another study that found a 20-25 percent increase in sales of French music on iTunes shortly before the law took effect, but they say it was due to "public education efforts" instead of the law itself.
http://arstechnica.com/tech-policy/2014/01/study-of-french-three-strikes-piracy-law-finds-no-deterrent-effect/
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2380522

23 Jan 2014 - Cross-Platform Malware Targeting Android Devices
Researchers have detected malware that can jump from Windows PCs to Android handsets through USB connections. The malware, known as the Fakebank Trojan, uses a developer tool called Android Debug Bridge to send the malware from the PC to the Android device. The malware is designed to seek out certain Korean banking applications. If the apps are found on the device, users are prompted in install an update, which is a malicious version of the app. Fakebank also monitors SMS messages.

http://www.v3.co.uk/v3-uk/news/2324750/windows-banking-trojan-jumps-to-target-android

21 Jan 2014 - Thirteen People Indicted in Gas Pump Bluetooth Skimming Scheme
Thirteen people have been indicted in connection with a gas pump card-skimming scheme. The Bluetooth-enabled skimming devices were placed on gas pumps at stores in states in the southern US; those behind the scheme allegedly used the information from the skimmers to make more than US $2 million in fraudulent ATM withdrawals.
http://www.theregister.co.uk/2014/01/23/us_card_scammers_pull_2m_petrol_heist/
http://news.cnet.com/8301-1009_3-57617638-83/13-indicted-in-$2m-gas-station-card-skimming-scheme/

20 Jan 2014 - South Korean Credit Bureau Employee Arrested For Allegedly Selling Personal Data to Telemarketers; Executives Resign
An employee of South Korea's Korea Credit Bureau has been arrested for allegedly selling personal information he had access to while working at the company. The breach appears to have affected as many as 20 million people. The compromised information includes names, credit card numbers, and expiration dates. The temporary employee allegedly stole information from the servers of KB Kookmin Card, Lotte Card, and NH Nonghyup Card, and sold the data to phone marketing companies. Managers of the phone marketing companies have been arrested as well.
http://www.theregister.co.uk/2014/01/20/korea_personal_details_card_breach_20_million/
http://www.zdnet.com/bank-data-of-20-million-customers-leaked-in-south-korea-7000025332/

14 Jan 2014 - Study Says US Government Workers Do Not Practice Good Mobile Device Security
According to a study from the Mobile Work Exchange, many US federal government employees are not taking appropriate measures to secure their mobile devices, despite established security policies. The report, commissioned by Cisco Systems, focused on tablets, smartphones, and laptops. While physical security seems to be more entrenched - 86 percent of the workers lock their computers while away from their desks
- - more than 40 percent of the 155 government workers surveyed use their mobile devices in ways that put their agencies and the devices at risk for a breach. Issues include using public wireless networks, failure to employ multi-factor authentication or encryption, and 25 percent do not use passwords for their devices. Also, downloading personal apps and opening messages from senders they do not know.
http://www.darkreading.com/end-user/feds-failing-to-secure-their-mobile-devi/240165345
http://www.mobileworkexchange.com/hotzone/report

12 Jan 2014 - Target Says Malware Found of Point-of-Sale Terminals
Target is now acknowledging that there was malware on its point-of-sale terminals. In addition, the breach, already one of the largest known breaches of payment card data to date, affected as many as 110 million Target customers, nearly three times the initial estimate. Target CEO Gregg Steinhafel says the company is planning "significant changes" in response to the breach, but did not elaborate.
http://www.scmagazine.com//target-ceo-confirms-malware-on-pos-machines-talks-chip-cards/article/329166/
http://news.cnet.com/8301-1009_3-57617106-83/target-confirms-malware-used-on-point-of-sale-terminals/

11 Jan 2014 - Neiman Marcus Investigating Payment Card Data Breach
Neiman Marcus says that it was also targeted in a data breach over the past few months. The retailer says its database was infiltrated in December. As in the Target breach, the attack affects people who shopped in physical stores but not online shoppers. Neiman Marcus is working with the Secret Service to investigate the breach.
http://news.cnet.com/8301-1009_3-57617075-83/credit-card-hackers-hit-neiman-marcus/
http://krebsonsecurity.com/2014/01/hackers-steal-card-data-from-neiman-marcus/

10 Jan 2014 - Cisco Warns of Vulnerability in Several Devices
Cisco has issued a security advisory warning of a vulnerability in some of its small business devices. The flaw could be exploited to gain root access to WAP4410N Wireless-N Access Points, WRVS4400N Wireless-N Gigabit Security Routers, and RVS4000 4-port Gigabit Security Routers. There are presently no workarounds for the issue, but Cisco says it will release updates to fix the problem by the end of the month. Internet Storm Center: https://isc.sans.edu/forums/diary/Cisco+Small+Business+Devices+backdoor+fix/17399/
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140110-sbd

8 Jan 2014 - When Support for Windows XP Ends in April, Microsoft Will Also Pull Security Essentials for XP
In what appears to be a concerted effort to urge users to upgrade from Windows XP to a more current version of the operating system, Microsoft has announced that when is stops supporting XP in April, it will also cease support for Security Essentials on XP.
http://www.v3.co.uk/v3-uk/news/2322034/microsoft-deals-new-blow-to-xp-diehards-by-pulling-malware-protection
http://arstechnica.com/information-technology/2014/01/security-essentials-for-windows-xp-will-die-when-the-os-does/

7 Jan 2014 - New Hampshire Town Lost Files to CryptoLocker
A New Hampshire town has lost eight years worth of computer files to the CryptoLocker ransomware. An employee at the Greenland, NH, town hall opened an attachment accompanying an email purporting to be from AT&T on December 26. The system administrator did not learn about the issue until four days later, after the deadline for paying the ransom had expired.
http://www.computerworld.com.my/resource/security/cryptolocker-scrambles-eight-years-of-data-belonging-to-us-town-hall/

2 Jan 2014 - Snapchat Data Stolen; App Will Be Updated
A database of Snapchat 4.6 million usernames and some associated telephone numbers with the last two digits blurred has been posted online. The site where the stolen data were posted has been taken down.
The people behind the attack say they exploited recent changes made to Snapchat to access the information. A message on Twitter from Snapchat CEO Evan Spiegel says that the company is "working with law enforcement [and] will update when we can."
http://www.cnn.com/2014/01/01/tech/social-media/snapchat-hack/index.html
http://www.zdnet.com/predictably-snapchat-user-database-maliciously-exposed-7000024697/

 

     
© 1999-2014 Security Awareness, Inc. All Rights Reserved  :  Privacy Statement
Contact Us     Site Map